Method to track and restrict reuse of information
Original Publication Date: 2009-Mar-31
Included in the Prior Art Database: 2009-Mar-31
Publishing Venue
IBM
Abstract
Method to track and restrict reuse of information
The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
"..." literal
Examples:
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
IBM
Method to track and restrict reuse of information
Undisclosed
English (United States)
Method to track and restrict reuse of information
Method to track and restrict reuse of information
Background
When person sends e-mail or writes document with confidential information, the information may be unexpectedly reused by other person.
There are already some methods to prohibit accessing to the information, by using encryption or access control. But once other person is allowed to access to the information, there is no way to restrict to reusing it. Also, some system already has feature that prevent copy or forward confidential information. But there is not a flexible way to allow or disallow copying a part of the information.
Furthermore, if the information was not confidential, person may want to notice when the information is obsolete. Person may want to directly update the information if it's reused in other place.
This method is to track and restrict reuse of information, or directly update the information that was reused.
Main Idea
When person writes some information by sending e-mail message or saving document in database system, a tracking data is automatically embedded to the information. The tracking data is to track copy or forward the original information by other person. Also, the tracking data includes the unique ID of the information and author of the information. It is registered to tracking database system to be referred later. (Fig 1) When other person reuses the information by forwarding e-mail or copying document, the tracking data is updated with the unique ID of the user who forwards or copies it. It is also registered to the tracking database. If the author or other user would like to track the information, the system can read all histories by searc...